27,603 research outputs found

    On-the job knowledge sharing: how to train employees to share job knowledge

    Get PDF
    One of the challenging issues many organizations are facing is to find the best ways to encourage employees share what they have learned on their jobs. Rewarding employees may be one of the techniques used to promote knowledge sharing but there are still psychological barriers preventing employees from sharing knowledge. In many cases, rewarding employees for sharing knowledge ends up in developing the behaviour of hoarding knowledge among employees. Based on a review of existing literature, this article explains how employers can make employees practice knowledge sharing in their daily work activities. The article introduces 12 approaches on how knowledge sharing can be cultivated in the job and train employees to accept that it is their job to share knowledge. Some of the methods discussed include; peer assist, training and mentoring, challenging projects, job description, job rotation, cross training, and sharing sessions. The article also discusses how on-the-job knowledge sharing can promote individual performance among employees. The intention of this article is to provide a framework that helps organizations to choose various methods of knowledge sharing that suit the organization’s needs in order to cultivate sharing of job knowledge and to save the knowledge as an asset

    Stigmergy in Web 2.0: a model for site dynamics

    Get PDF
    Building Web 2.0 sites does not necessarily ensure the success of the site. We aim to better understand what improves the success of a site by drawing insight from biologically inspired design patterns. Web 2.0 sites provide a mechanism for human interaction enabling powerful intercommunication between massive volumes of users. Early Web 2.0 site providers that were previously dominant are being succeeded by newer sites providing innovative social interaction mechanisms. Understanding what site traits contribute to this success drives research into Web sites mechanics using models to describe the associated social networking behaviour. Some of these models attempt to show how the volume of users provides a self-organising and self-contextualisation of content. One model describing coordinated environments is called stigmergy, a term originally describing coordinated insect behavior. This paper explores how exploiting stigmergy can provide a valuable mechanism for identifying and analysing online user behavior specifically when considering that user freedom of choice is restricted by the provided web site functionality. This will aid our building better collaborative Web sites improving the collaborative processes

    Vandalism on Collaborative Web Communities: An Exploration of Editorial Behaviour in Wikipedia

    Get PDF
    Modern online discussion communities allow people to contribute, sometimes anonymously. Such flexibility sometimes threatens the reputation and reliability of community-owned resources. Such flexibility is understandable, however, they engender threats to the reputation and reliability in collective goods. Since not a lot of previous work addressed these issues it is important to study the aforementioned issues to build an innate understanding of recent ongoing vandalism of Wikipedia pages and ways to preventing those. In this study, we consider the type of activity that the anonymous users carry out on Wikipedia and also contemplate how others react to their activities. In particular, we want to study vandalism of Wikipedia pages and ways of preventing this kind of activity. Our preliminary analysis reveals (~ 90%) of the vandalism or foul edits are done by unregistered users in Wikipedia due to nature of openness. The community reaction seemed to be immediate: most vandalisms were reverted within five minutes on an average. Further analysis shed light on the tolerance of Wikipedia community, reliability of anonymous users revisions and feasibility of early prediction of vandalism

    Privacy in crowdsourcing:a systematic review

    Get PDF
    The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p

    A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines

    Full text link
    The concept of social machines is increasingly being used to characterise various socio-cognitive spaces on the Web. Social machines are human collectives using networked digital technology which initiate real-world processes and activities including human communication, interactions and knowledge creation. As such, they continuously emerge and fade on the Web. The relationship between humans and machines is made more complex by the adoption of Internet of Things (IoT) sensors and devices. The scale, automation, continuous sensing, and actuation capabilities of these devices add an extra dimension to the relationship between humans and machines making it difficult to understand their evolution at either the systemic or the conceptual level. This article describes these new socio-technical systems, which we term Cyber-Physical Social Machines, through different exemplars, and considers the associated challenges of security and privacy.Comment: 14 pages, 4 figure

    Emerging technologies for learning (volume 2)

    Get PDF

    Learners’ continuance participation intention of collaborative group project in virtual learning environment: an extended TAM perspective

    Get PDF
    The aim of this study is to explore learners’ intention to return to the electronic environment through the use of wikipages. The survey is based on students’ participation in a collaborative group project over a one semester course on business information systems. A research model based on the extended Technology Acceptance Model (TAM) has been proposed to investigate what factors will influence learners’ continuance participation in the electronic learning environment. 75% of students returned the questionnaire and the data analysis results based on the extended TAM Shows that the learners’ intention to return to the electronic learning environment was highly associated with their attitude towards the electronic learning tool and the affection associated with the tool
    • …
    corecore